2022-06-15 15:01:55 +00:00
{
2022-10-11 13:00:31 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "security@xen.org" ,
"ID" : "CVE-2022-33747" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "xen" ,
"version" : {
"version_data" : [
{
"version_affected" : "?" ,
"version_value" : "consult Xen advisory XSA-409"
}
]
}
}
]
} ,
"vendor_name" : "Xen"
}
]
}
} ,
"configuration" : {
"configuration_data" : {
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "All versions of Xen are affected.\n\nOnly Arm systems are vulnerable. x86 systems are not vulnerable."
}
]
}
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
2022-06-15 15:01:55 +00:00
{
2022-10-11 13:00:31 +00:00
"lang" : "eng" ,
"value" : "Arm: unbounded memory consumption for 2nd-level page tables Certain actions require e.g. removing pages from a guest's P2M (Physical-to-Machine) mapping. When large pages are in use to map guest pages in the 2nd-stage page tables, such a removal operation may incur a memory allocation (to replace a large mapping with individual smaller ones). These memory allocations are taken from the global memory pool. A malicious guest might be able to cause the global memory pool to be exhausted by manipulating its own P2M mappings."
2022-06-15 15:01:55 +00:00
}
2022-10-11 13:00:31 +00:00
]
} ,
"impact" : {
"impact_data" : {
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "A malicious guest could cause a Denial of Service, preventing any system\noperation requiring further allocation of Xen memory, including creating\nnew guests. NB however that memory exhaustion by itself shouldn\u2019t cause\neither Xen or properly-written guests to crash."
}
]
}
}
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "unknown"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"url" : "https://xenbits.xenproject.org/xsa/advisory-409.txt" ,
"refsource" : "MISC" ,
"name" : "https://xenbits.xenproject.org/xsa/advisory-409.txt"
2022-10-11 14:00:31 +00:00
} ,
{
"refsource" : "CONFIRM" ,
"name" : "http://xenbits.xen.org/xsa/advisory-409.html" ,
"url" : "http://xenbits.xen.org/xsa/advisory-409.html"
2022-10-11 15:00:33 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[oss-security] 20221011 Xen Security Advisory 409 v3 (CVE-2022-33747) - Arm: unbounded memory consumption for 2nd-level page tables" ,
"url" : "http://www.openwall.com/lists/oss-security/2022/10/11/5"
2022-10-30 23:00:32 +00:00
} ,
{
"refsource" : "FEDORA" ,
"name" : "FEDORA-2022-5b594b82ac" ,
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWSC77GS5NATI3TT7FMVPULUPXR635XQ/"
2022-11-07 08:00:34 +00:00
} ,
{
"refsource" : "DEBIAN" ,
"name" : "DSA-5272" ,
"url" : "https://www.debian.org/security/2022/dsa-5272"
2022-11-14 15:00:34 +00:00
} ,
{
"refsource" : "FEDORA" ,
"name" : "FEDORA-2022-d80cc73088" ,
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJOMUNGW6VTK5CZZRLWLVVEOUPEQBRHI/"
2022-11-17 03:00:34 +00:00
} ,
{
"refsource" : "FEDORA" ,
"name" : "FEDORA-2022-99af00f60e" ,
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/"
2022-10-11 13:00:31 +00:00
}
]
} ,
"workaround" : {
"workaround_data" : {
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "There is no known mitigation."
}
]
}
}
}
}